smime.c 20.9 KB
Newer Older
1
/*
R
Rich Salz 已提交
2
 * Copyright 1999-2016 The OpenSSL Project Authors. All Rights Reserved.
3
 *
R
Rich Salz 已提交
4 5 6 7
 * Licensed under the OpenSSL license (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
8 9 10 11 12 13
 */

/* S/MIME utility function */

#include <stdio.h>
#include <string.h>
14
#include "apps.h"
15
#include <openssl/crypto.h>
16 17
#include <openssl/pem.h>
#include <openssl/err.h>
18 19
#include <openssl/x509_vfy.h>
#include <openssl/x509v3.h>
20

21
static int save_certs(char *signerfile, STACK_OF(X509) *signers);
22
static int smime_cb(int ok, X509_STORE_CTX *ctx);
23

24 25 26 27 28 29 30 31 32
#define SMIME_OP        0x10
#define SMIME_IP        0x20
#define SMIME_SIGNERS   0x40
#define SMIME_ENCRYPT   (1 | SMIME_OP)
#define SMIME_DECRYPT   (2 | SMIME_IP)
#define SMIME_SIGN      (3 | SMIME_OP | SMIME_SIGNERS)
#define SMIME_VERIFY    (4 | SMIME_IP)
#define SMIME_PK7OUT    (5 | SMIME_IP | SMIME_OP)
#define SMIME_RESIGN    (6 | SMIME_IP | SMIME_OP | SMIME_SIGNERS)
33

34 35 36 37 38 39 40 41 42 43
typedef enum OPTION_choice {
    OPT_ERR = -1, OPT_EOF = 0, OPT_HELP,
    OPT_ENCRYPT, OPT_DECRYPT, OPT_SIGN, OPT_RESIGN, OPT_VERIFY,
    OPT_PK7OUT, OPT_TEXT, OPT_NOINTERN, OPT_NOVERIFY, OPT_NOCHAIN,
    OPT_NOCERTS, OPT_NOATTR, OPT_NODETACH, OPT_NOSMIMECAP,
    OPT_BINARY, OPT_NOSIGS, OPT_STREAM, OPT_INDEF, OPT_NOINDEF,
    OPT_NOOLDMIME, OPT_CRLFEOL, OPT_RAND, OPT_ENGINE, OPT_PASSIN,
    OPT_TO, OPT_FROM, OPT_SUBJECT, OPT_SIGNER, OPT_RECIP, OPT_MD,
    OPT_CIPHER, OPT_INKEY, OPT_KEYFORM, OPT_CERTFILE, OPT_CAFILE,
    OPT_V_ENUM,
44 45
    OPT_CAPATH, OPT_NOCAFILE, OPT_NOCAPATH, OPT_IN, OPT_INFORM, OPT_OUT,
    OPT_OUTFORM, OPT_CONTENT
46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68
} OPTION_CHOICE;

OPTIONS smime_options[] = {
    {OPT_HELP_STR, 1, '-', "Usage: %s [options] cert.pem...\n"},
    {OPT_HELP_STR, 1, '-',
        "  cert.pem... recipient certs for encryption\n"},
    {OPT_HELP_STR, 1, '-', "Valid options are:\n"},
    {"help", OPT_HELP, '-', "Display this summary"},
    {"encrypt", OPT_ENCRYPT, '-', "Encrypt message"},
    {"decrypt", OPT_DECRYPT, '-', "Decrypt encrypted message"},
    {"sign", OPT_SIGN, '-', "Sign message"},
    {"verify", OPT_VERIFY, '-', "Verify signed message"},
    {"pk7out", OPT_PK7OUT, '-', "Output PKCS#7 structure"},
    {"nointern", OPT_NOINTERN, '-',
     "Don't search certificates in message for signer"},
    {"nosigs", OPT_NOSIGS, '-', "Don't verify message signature"},
    {"noverify", OPT_NOVERIFY, '-', "Don't verify signers certificate"},
    {"nocerts", OPT_NOCERTS, '-',
     "Don't include signers certificate when signing"},
    {"nodetach", OPT_NODETACH, '-', "Use opaque signing"},
    {"noattr", OPT_NOATTR, '-', "Don't include any signed attributes"},
    {"binary", OPT_BINARY, '-', "Don't translate message to text"},
    {"certfile", OPT_CERTFILE, '<', "Other certificates file"},
69
    {"signer", OPT_SIGNER, 's', "Signer certificate file"},
70 71
    {"recip", OPT_RECIP, '<', "Recipient certificate file for decryption"},
    {"in", OPT_IN, '<', "Input file"},
72
    {"inform", OPT_INFORM, 'c', "Input format SMIME (default), PEM or DER"},
73 74 75 76
    {"inkey", OPT_INKEY, '<',
     "Input private key (if not signer or recipient)"},
    {"keyform", OPT_KEYFORM, 'f', "Input private key format (PEM or ENGINE)"},
    {"out", OPT_OUT, '>', "Output file"},
77
    {"outform", OPT_OUTFORM, 'c',
78 79 80 81 82 83 84 85 86
     "Output format SMIME (default), PEM or DER"},
    {"content", OPT_CONTENT, '<',
     "Supply or override content for detached signature"},
    {"to", OPT_TO, 's', "To address"},
    {"from", OPT_FROM, 's', "From address"},
    {"subject", OPT_SUBJECT, 's', "Subject"},
    {"text", OPT_TEXT, '-', "Include or delete text MIME headers"},
    {"CApath", OPT_CAPATH, '/', "Trusted certificates directory"},
    {"CAfile", OPT_CAFILE, '<', "Trusted certificates file"},
87 88 89 90
    {"no-CAfile", OPT_NOCAFILE, '-',
     "Do not load the default certificates file"},
    {"no-CApath", OPT_NOCAPATH, '-',
     "Do not load certificates from the default certificates directory"},
91 92 93 94 95 96 97 98 99 100 101
    {"resign", OPT_RESIGN, '-'},
    {"nochain", OPT_NOCHAIN, '-'},
    {"nosmimecap", OPT_NOSMIMECAP, '-'},
    {"stream", OPT_STREAM, '-'},
    {"indef", OPT_INDEF, '-'},
    {"noindef", OPT_NOINDEF, '-'},
    {"nooldmime", OPT_NOOLDMIME, '-'},
    {"crlfeol", OPT_CRLFEOL, '-'},
    {"rand", OPT_RAND, 's',
     "Load the file(s) into the random number generator"},
    {"passin", OPT_PASSIN, 's', "Input file pass phrase source"},
102
    {"md", OPT_MD, 's', "Digest algorithm to use when signing or resigning"},
103 104 105 106 107 108 109
    {"", OPT_CIPHER, '-', "Any supported cipher"},
    OPT_V_OPTIONS,
#ifndef OPENSSL_NO_ENGINE
    {"engine", OPT_ENGINE, 's', "Use engine, possibly a hardware device"},
#endif
    {NULL}
};
110

111
int smime_main(int argc, char **argv)
112
{
113
    BIO *in = NULL, *out = NULL, *indata = NULL;
114
    EVP_PKEY *key = NULL;
115 116
    PKCS7 *p7 = NULL;
    STACK_OF(OPENSSL_STRING) *sksigners = NULL, *skkeys = NULL;
117
    STACK_OF(X509) *encerts = NULL, *other = NULL;
118 119 120 121
    X509 *cert = NULL, *recip = NULL, *signer = NULL;
    X509_STORE *store = NULL;
    X509_VERIFY_PARAM *vpm = NULL;
    const EVP_CIPHER *cipher = NULL;
122
    const EVP_MD *sign_md = NULL;
R
Rich Salz 已提交
123
    char *CAfile = NULL, *CApath = NULL, *inrand = NULL;
124 125 126 127 128 129
    char *certfile = NULL, *keyfile = NULL, *contfile = NULL, *prog;
    char *infile = NULL, *outfile = NULL, *signerfile = NULL, *recipfile =
        NULL;
    char *passinarg = NULL, *passin = NULL, *to = NULL, *from =
        NULL, *subject = NULL;
    OPTION_CHOICE o;
130
    int noCApath = 0, noCAfile = 0;
131 132 133 134 135 136
    int flags = PKCS7_DETACHED, operation = 0, ret = 0, need_rand = 0, indef =
        0;
    int informat = FORMAT_SMIME, outformat = FORMAT_SMIME, keyform =
        FORMAT_PEM;
    int vpmtouched = 0, rv = 0;
    ENGINE *e = NULL;
D
Dr. Stephen Henson 已提交
137
    const char *mime_eol = "\n";
138

139 140
    if ((vpm = X509_VERIFY_PARAM_new()) == NULL)
        return 1;
141

142 143 144 145 146 147 148 149 150 151 152 153 154
    prog = opt_init(argc, argv, smime_options);
    while ((o = opt_next()) != OPT_EOF) {
        switch (o) {
        case OPT_EOF:
        case OPT_ERR:
 opthelp:
            BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
            goto end;
        case OPT_HELP:
            opt_help(smime_options);
            ret = 0;
            goto end;
        case OPT_INFORM:
155
            if (!opt_format(opt_arg(), OPT_FMT_PDS, &informat))
156 157 158 159 160 161
                goto opthelp;
            break;
        case OPT_IN:
            infile = opt_arg();
            break;
        case OPT_OUTFORM:
162
            if (!opt_format(opt_arg(), OPT_FMT_PDS, &outformat))
163 164 165 166 167 168
                goto opthelp;
            break;
        case OPT_OUT:
            outfile = opt_arg();
            break;
        case OPT_ENCRYPT:
169
            operation = SMIME_ENCRYPT;
170 171
            break;
        case OPT_DECRYPT:
172
            operation = SMIME_DECRYPT;
173 174
            break;
        case OPT_SIGN:
175
            operation = SMIME_SIGN;
176 177
            break;
        case OPT_RESIGN:
178
            operation = SMIME_RESIGN;
179 180
            break;
        case OPT_VERIFY:
181
            operation = SMIME_VERIFY;
182 183
            break;
        case OPT_PK7OUT:
184
            operation = SMIME_PK7OUT;
185 186
            break;
        case OPT_TEXT:
187
            flags |= PKCS7_TEXT;
188 189
            break;
        case OPT_NOINTERN:
190
            flags |= PKCS7_NOINTERN;
191 192
            break;
        case OPT_NOVERIFY:
193
            flags |= PKCS7_NOVERIFY;
194 195
            break;
        case OPT_NOCHAIN:
196
            flags |= PKCS7_NOCHAIN;
197 198
            break;
        case OPT_NOCERTS:
199
            flags |= PKCS7_NOCERTS;
200 201
            break;
        case OPT_NOATTR:
202
            flags |= PKCS7_NOATTR;
203 204
            break;
        case OPT_NODETACH:
205
            flags &= ~PKCS7_DETACHED;
206 207
            break;
        case OPT_NOSMIMECAP:
208
            flags |= PKCS7_NOSMIMECAP;
209 210
            break;
        case OPT_BINARY:
211
            flags |= PKCS7_BINARY;
212 213
            break;
        case OPT_NOSIGS:
214
            flags |= PKCS7_NOSIGS;
215 216 217
            break;
        case OPT_STREAM:
        case OPT_INDEF:
218
            indef = 1;
219 220
            break;
        case OPT_NOINDEF:
221
            indef = 0;
222 223
            break;
        case OPT_NOOLDMIME:
224
            flags |= PKCS7_NOOLDMIMETYPE;
225 226
            break;
        case OPT_CRLFEOL:
227
            flags |= PKCS7_CRLFEOL;
D
Dr. Stephen Henson 已提交
228
            mime_eol = "\r\n";
229 230 231
            break;
        case OPT_RAND:
            inrand = opt_arg();
232
            need_rand = 1;
233 234
            break;
        case OPT_ENGINE:
R
Rich Salz 已提交
235
            e = setup_engine(opt_arg(), 0);
236 237 238 239 240 241 242 243 244 245 246 247 248 249
            break;
        case OPT_PASSIN:
            passinarg = opt_arg();
            break;
        case OPT_TO:
            to = opt_arg();
            break;
        case OPT_FROM:
            from = opt_arg();
            break;
        case OPT_SUBJECT:
            subject = opt_arg();
            break;
        case OPT_SIGNER:
250 251
            /* If previous -signer argument add signer to list */
            if (signerfile) {
252 253 254
                if (sksigners == NULL
                    && (sksigners = sk_OPENSSL_STRING_new_null()) == NULL)
                    goto end;
255
                sk_OPENSSL_STRING_push(sksigners, signerfile);
256
                if (keyfile == NULL)
257
                    keyfile = signerfile;
258 259 260
                if (skkeys == NULL
                    && (skkeys = sk_OPENSSL_STRING_new_null()) == NULL)
                    goto end;
261 262 263
                sk_OPENSSL_STRING_push(skkeys, keyfile);
                keyfile = NULL;
            }
264 265 266 267 268 269 270 271 272 273 274 275 276 277
            signerfile = opt_arg();
            break;
        case OPT_RECIP:
            recipfile = opt_arg();
            break;
        case OPT_MD:
            if (!opt_md(opt_arg(), &sign_md))
                goto opthelp;
            break;
        case OPT_CIPHER:
            if (!opt_cipher(opt_unknown(), &cipher))
                goto opthelp;
            break;
        case OPT_INKEY:
F
FdaSilvaYY 已提交
278
            /* If previous -inkey argument add signer to list */
279
            if (keyfile) {
280 281 282 283
                if (signerfile == NULL) {
                    BIO_printf(bio_err,
                               "%s: Must have -signer before -inkey\n", prog);
                    goto opthelp;
284
                }
285 286 287
                if (sksigners == NULL
                    && (sksigners = sk_OPENSSL_STRING_new_null()) == NULL)
                    goto end;
288 289
                sk_OPENSSL_STRING_push(sksigners, signerfile);
                signerfile = NULL;
290 291 292
                if (skkeys == NULL
                    && (skkeys = sk_OPENSSL_STRING_new_null()) == NULL)
                    goto end;
293 294
                sk_OPENSSL_STRING_push(skkeys, keyfile);
            }
295 296 297 298 299 300 301 302 303 304 305 306 307 308 309
            keyfile = opt_arg();
            break;
        case OPT_KEYFORM:
            if (!opt_format(opt_arg(), OPT_FMT_ANY, &keyform))
                goto opthelp;
            break;
        case OPT_CERTFILE:
            certfile = opt_arg();
            break;
        case OPT_CAFILE:
            CAfile = opt_arg();
            break;
        case OPT_CAPATH:
            CApath = opt_arg();
            break;
310 311 312 313 314 315
        case OPT_NOCAFILE:
            noCAfile = 1;
            break;
        case OPT_NOCAPATH:
            noCApath = 1;
            break;
316 317 318 319 320 321 322 323 324
        case OPT_CONTENT:
            contfile = opt_arg();
            break;
        case OPT_V_CASES:
            if (!opt_verify(o, vpm))
                goto opthelp;
            vpmtouched++;
            break;
        }
325
    }
326 327
    argc = opt_num_rest();
    argv = opt_rest();
328 329 330

    if (!(operation & SMIME_SIGNERS) && (skkeys || sksigners)) {
        BIO_puts(bio_err, "Multiple signers or keys not allowed\n");
331
        goto opthelp;
332 333 334 335 336 337
    }

    if (operation & SMIME_SIGNERS) {
        /* Check to see if any final signer needs to be appended */
        if (keyfile && !signerfile) {
            BIO_puts(bio_err, "Illegal -inkey without -signer\n");
338
            goto opthelp;
339 340
        }
        if (signerfile) {
341 342 343
            if (!sksigners
                && (sksigners = sk_OPENSSL_STRING_new_null()) == NULL)
                goto end;
344
            sk_OPENSSL_STRING_push(sksigners, signerfile);
345 346
            if (!skkeys && (skkeys = sk_OPENSSL_STRING_new_null()) == NULL)
                goto end;
347 348 349 350 351 352
            if (!keyfile)
                keyfile = signerfile;
            sk_OPENSSL_STRING_push(skkeys, keyfile);
        }
        if (!sksigners) {
            BIO_printf(bio_err, "No signer certificate specified\n");
353
            goto opthelp;
354 355 356 357 358 359 360 361
        }
        signerfile = NULL;
        keyfile = NULL;
        need_rand = 1;
    } else if (operation == SMIME_DECRYPT) {
        if (!recipfile && !keyfile) {
            BIO_printf(bio_err,
                       "No recipient certificate or key specified\n");
362
            goto opthelp;
363 364
        }
    } else if (operation == SMIME_ENCRYPT) {
365
        if (argc == 0) {
366
            BIO_printf(bio_err, "No recipient(s) certificate(s) specified\n");
367
            goto opthelp;
368 369 370
        }
        need_rand = 1;
    } else if (!operation)
371 372 373
        goto opthelp;

    if (!app_passwd(passinarg, NULL, &passin, NULL)) {
374 375 376 377 378
        BIO_printf(bio_err, "Error getting password\n");
        goto end;
    }

    if (need_rand) {
379
        app_RAND_load_file(NULL, (inrand != NULL));
380 381 382 383 384 385 386 387 388 389
        if (inrand != NULL)
            BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
                       app_RAND_load_files(inrand));
    }

    ret = 2;

    if (!(operation & SMIME_SIGNERS))
        flags &= ~PKCS7_DETACHED;

390
    if (!(operation & SMIME_OP)) {
391
        if (flags & PKCS7_BINARY)
392
            outformat = FORMAT_BINARY;
393 394
    }

395
    if (!(operation & SMIME_IP)) {
396
        if (flags & PKCS7_BINARY)
397
            informat = FORMAT_BINARY;
398 399 400 401 402 403
    }

    if (operation == SMIME_ENCRYPT) {
        if (!cipher) {
#ifndef OPENSSL_NO_DES
            cipher = EVP_des_ede3_cbc();
B
Bodo Möller 已提交
404
#else
405 406
            BIO_printf(bio_err, "No cipher selected\n");
            goto end;
B
Bodo Möller 已提交
407
#endif
408 409
        }
        encerts = sk_X509_new_null();
410 411 412 413
        if (!encerts)
            goto end;
        while (*argv) {
            cert = load_cert(*argv, FORMAT_PEM,
414
                             "recipient certificate file");
415
            if (cert == NULL)
416 417 418
                goto end;
            sk_X509_push(encerts, cert);
            cert = NULL;
419
            argv++;
420 421 422 423
        }
    }

    if (certfile) {
424
        if (!load_certs(certfile, &other, FORMAT_PEM, NULL,
425
                        "certificate file")) {
426 427 428 429 430 431
            ERR_print_errors(bio_err);
            goto end;
        }
    }

    if (recipfile && (operation == SMIME_DECRYPT)) {
432 433
        if ((recip = load_cert(recipfile, FORMAT_PEM,
                               "recipient certificate file")) == NULL) {
434 435 436 437 438 439 440 441 442 443 444 445 446 447 448
            ERR_print_errors(bio_err);
            goto end;
        }
    }

    if (operation == SMIME_DECRYPT) {
        if (!keyfile)
            keyfile = recipfile;
    } else if (operation == SMIME_SIGN) {
        if (!keyfile)
            keyfile = signerfile;
    } else
        keyfile = NULL;

    if (keyfile) {
449
        key = load_key(keyfile, keyform, 0, passin, e, "signing key file");
450 451 452 453
        if (!key)
            goto end;
    }

454
    in = bio_open_default(infile, 'r', informat);
455 456
    if (in == NULL)
        goto end;
457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475

    if (operation & SMIME_IP) {
        if (informat == FORMAT_SMIME)
            p7 = SMIME_read_PKCS7(in, &indata);
        else if (informat == FORMAT_PEM)
            p7 = PEM_read_bio_PKCS7(in, NULL, NULL, NULL);
        else if (informat == FORMAT_ASN1)
            p7 = d2i_PKCS7_bio(in, NULL);
        else {
            BIO_printf(bio_err, "Bad input format for PKCS#7 file\n");
            goto end;
        }

        if (!p7) {
            BIO_printf(bio_err, "Error reading S/MIME message\n");
            goto end;
        }
        if (contfile) {
            BIO_free(indata);
476
            if ((indata = BIO_new_file(contfile, "rb")) == NULL) {
477 478 479 480 481 482
                BIO_printf(bio_err, "Can't read content file %s\n", contfile);
                goto end;
            }
        }
    }

483
    out = bio_open_default(outfile, 'w', outformat);
484 485
    if (out == NULL)
        goto end;
486 487

    if (operation == SMIME_VERIFY) {
488
        if ((store = setup_verify(CAfile, CApath, noCAfile, noCApath)) == NULL)
489 490
            goto end;
        X509_STORE_set_verify_cb(store, smime_cb);
491
        if (vpmtouched)
492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527
            X509_STORE_set1_param(store, vpm);
    }

    ret = 3;

    if (operation == SMIME_ENCRYPT) {
        if (indef)
            flags |= PKCS7_STREAM;
        p7 = PKCS7_encrypt(encerts, in, cipher, flags);
    } else if (operation & SMIME_SIGNERS) {
        int i;
        /*
         * If detached data content we only enable streaming if S/MIME output
         * format.
         */
        if (operation == SMIME_SIGN) {
            if (flags & PKCS7_DETACHED) {
                if (outformat == FORMAT_SMIME)
                    flags |= PKCS7_STREAM;
            } else if (indef)
                flags |= PKCS7_STREAM;
            flags |= PKCS7_PARTIAL;
            p7 = PKCS7_sign(NULL, NULL, other, in, flags);
            if (!p7)
                goto end;
            if (flags & PKCS7_NOCERTS) {
                for (i = 0; i < sk_X509_num(other); i++) {
                    X509 *x = sk_X509_value(other, i);
                    PKCS7_add_certificate(p7, x);
                }
            }
        } else
            flags |= PKCS7_REUSE_DIGEST;
        for (i = 0; i < sk_OPENSSL_STRING_num(sksigners); i++) {
            signerfile = sk_OPENSSL_STRING_value(sksigners, i);
            keyfile = sk_OPENSSL_STRING_value(skkeys, i);
528 529
            signer = load_cert(signerfile, FORMAT_PEM,
                               "signer certificate");
530 531
            if (!signer)
                goto end;
532
            key = load_key(keyfile, keyform, 0, passin, e, "signing key file");
533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578
            if (!key)
                goto end;
            if (!PKCS7_sign_add_signer(p7, signer, key, sign_md, flags))
                goto end;
            X509_free(signer);
            signer = NULL;
            EVP_PKEY_free(key);
            key = NULL;
        }
        /* If not streaming or resigning finalize structure */
        if ((operation == SMIME_SIGN) && !(flags & PKCS7_STREAM)) {
            if (!PKCS7_final(p7, in, flags))
                goto end;
        }
    }

    if (!p7) {
        BIO_printf(bio_err, "Error creating PKCS#7 structure\n");
        goto end;
    }

    ret = 4;
    if (operation == SMIME_DECRYPT) {
        if (!PKCS7_decrypt(p7, key, recip, out, flags)) {
            BIO_printf(bio_err, "Error decrypting PKCS#7 structure\n");
            goto end;
        }
    } else if (operation == SMIME_VERIFY) {
        STACK_OF(X509) *signers;
        if (PKCS7_verify(p7, other, store, indata, out, flags))
            BIO_printf(bio_err, "Verification successful\n");
        else {
            BIO_printf(bio_err, "Verification failure\n");
            goto end;
        }
        signers = PKCS7_get0_signers(p7, other, flags);
        if (!save_certs(signerfile, signers)) {
            BIO_printf(bio_err, "Error writing signers to %s\n", signerfile);
            ret = 5;
            goto end;
        }
        sk_X509_free(signers);
    } else if (operation == SMIME_PK7OUT)
        PEM_write_bio_PKCS7(out, p7);
    else {
        if (to)
D
Dr. Stephen Henson 已提交
579
            BIO_printf(out, "To: %s%s", to, mime_eol);
580
        if (from)
D
Dr. Stephen Henson 已提交
581
            BIO_printf(out, "From: %s%s", from, mime_eol);
582
        if (subject)
D
Dr. Stephen Henson 已提交
583
            BIO_printf(out, "Subject: %s%s", subject, mime_eol);
584 585
        if (outformat == FORMAT_SMIME) {
            if (operation == SMIME_RESIGN)
586
                rv = SMIME_write_PKCS7(out, p7, indata, flags);
587
            else
588
                rv = SMIME_write_PKCS7(out, p7, in, flags);
589
        } else if (outformat == FORMAT_PEM)
590
            rv = PEM_write_bio_PKCS7_stream(out, p7, in, flags);
591
        else if (outformat == FORMAT_ASN1)
592
            rv = i2d_PKCS7_bio_stream(out, p7, in, flags);
593 594 595 596
        else {
            BIO_printf(bio_err, "Bad output format for PKCS#7 file\n");
            goto end;
        }
597 598 599 600 601
        if (rv == 0) {
            BIO_printf(bio_err, "Error writing output\n");
            ret = 3;
            goto end;
        }
602 603 604 605
    }
    ret = 0;
 end:
    if (need_rand)
606
        app_RAND_write_file(NULL);
607 608 609 610
    if (ret)
        ERR_print_errors(bio_err);
    sk_X509_pop_free(encerts, X509_free);
    sk_X509_pop_free(other, X509_free);
R
Rich Salz 已提交
611
    X509_VERIFY_PARAM_free(vpm);
R
Rich Salz 已提交
612 613
    sk_OPENSSL_STRING_free(sksigners);
    sk_OPENSSL_STRING_free(skkeys);
614 615 616 617 618 619 620 621 622
    X509_STORE_free(store);
    X509_free(cert);
    X509_free(recip);
    X509_free(signer);
    EVP_PKEY_free(key);
    PKCS7_free(p7);
    BIO_free(in);
    BIO_free(indata);
    BIO_free_all(out);
R
Rich Salz 已提交
623
    OPENSSL_free(passin);
624
    return (ret);
625 626
}

B
Bodo Möller 已提交
627
static int save_certs(char *signerfile, STACK_OF(X509) *signers)
628 629 630 631 632 633 634 635 636 637 638 639 640
{
    int i;
    BIO *tmp;
    if (!signerfile)
        return 1;
    tmp = BIO_new_file(signerfile, "w");
    if (!tmp)
        return 0;
    for (i = 0; i < sk_X509_num(signers); i++)
        PEM_write_bio_X509(tmp, sk_X509_value(signers, i));
    BIO_free(tmp);
    return 1;
}
641 642 643 644

/* Minimal callback just to output policy info (if any) */

static int smime_cb(int ok, X509_STORE_CTX *ctx)
645 646
{
    int error;
647

648
    error = X509_STORE_CTX_get_error(ctx);
649

650 651 652
    if ((error != X509_V_ERR_NO_EXPLICIT_POLICY)
        && ((error != X509_V_OK) || (ok != 2)))
        return ok;
653

R
Rich Salz 已提交
654
    policies_print(ctx);
655

656
    return ok;
657

658
}